Efficient Sharing of Encrypted Data

@inproceedings{Bennett2002EfficientSO,
  title={Efficient Sharing of Encrypted Data},
  author={Krista Bennett and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu},
  booktitle={ACISP},
  year={2002}
}
This paper describes the design of a censorship-resistant distributed file sharing protocol which has been implemented on top of gnunet, an anonymous, reputation-based network. [] Key Method Our encoding allows users to share files encrypted under descriptive keys which are the basis for querying the network for content. A key property of our encoding is that intermediaries can filter invalid encrypted replies without being able to decrypt the query or the reply. Files are stored in small chunks which are…
An Encoding for Censorship-Resistant Sharing
TLDR
The proposed ECRS supports both efficient dissemination of encrypted data as well as encrypted queries over this data, and allows users to share files encrypted under descriptive keys which are the basis for querying the network for content.
Distributed Key Generation for Secure Encrypted Deduplication
  • Yitao Duan
  • Computer Science, Mathematics
    IACR Cryptol. ePrint Arch.
  • 2013
TLDR
This paper provides a rigorous proof of security, in the random oracle model, for the DupLESS architecture, and introduces a distributed protocol that eliminates the need for a key server and allows less managed systems such as P2P systems to enjoy the high security level.
Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy
TLDR
This paper introduces a new security notion appropriate for the setting of deduplication and shows that it is strictly stronger than all relevant notions, and provides a rigorous proof of security against this notion, in the random oracle model, for the DupLESS architecture which is lacking in the original paper.
Privacy Preserving Keyword Searches on Remote Encrypted Data
TLDR
This paper offers solutions for the problem of efficiently retrieving some of the encrypted files containing (or indexed by) specific keywords, keeping the keywords themselves secret and not jeopardizing the security of the remotely stored files.
Efficiency Enhancements for Practical Techniques for Searches on Encrypted Data
TLDR
An implementation results of an existing symmetric searchable encryption scheme where every word in a text file is treated as a keyword for search are discussed, with close to 90% reduction in extra space usage and more than 90% improvement in search time compared to the original scheme.
Global Heuristic Search on Encrypted Data (GHSED)
TLDR
A technique called a global heuristic search on encrypted data (GHSED) technique will be described for search in an encrypted files using public key encryption stored on an untrusted server and retrieve the files that satisfy a certain search pattern without revealing any information about the original files.
SSS-V2: Secure Similarity Search
TLDR
This work proposes a novel idea of Security Similarity Search over encrypted documents by applying character-wise encryption with approximate string matching to keyword index search systems, and proposes two similarity search schemes and formally proves the security of the schemes.
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
TLDR
The characteristics of cloud computing are investigated and an efficient privacy preserving keyword search scheme in cloud computing is proposed that allows a service provider to participate in partial decipherment to reduce a client's computational overhead and enables the service providers to search the keywords on encrypted files to protect the user data privacy and the user queries privacy efficiently.
...
...

References

SHOWING 1-10 OF 11 REFERENCES
Practical techniques for searches on encrypted data
  • D. Song, D. Wagner, A. Perrig
  • Computer Science, Mathematics
    Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
  • 2000
TLDR
This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Tangler: a censorship-resistant publishing system based on document entanglements
TLDR
The design of a censorship-resistant system that employs a unique document storage mechanism designed to eject non-compliant servers and prevent them from doing more harm than good is described.
Publius: a robust, tamper-evident, censorship-resistant web publishing system
TLDR
This work describes a system that has the property that it is very difficult for any adversary to censor or modify the content, and the identity of the publisher is protected once the content is posted.
Freenet: A Distributed Anonymous Information Storage and Retrieval System
We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet
A Distributed Decentralised Information Storage and Retrieval System
TLDR
An algorithm which if executed by a group of interconnected nodes will provide a robust key-indexed information storage and retrieval system with no element of central control or administration with improvements over the existing World Wide Web are described.
Efficient dispersal of information for security, load balancing, and fault tolerance
TLDR
Information Dispersal Algorithm (IDA) has numerous applications to secure and reliable storage of information in computer networks and even on single disks, to fault-tolerant and efficient transmission ofInformation in networks, and to communications between processors in parallel computers.
Mojo Nation. Technology overview
  • Mojo Nation. Technology overview
  • 2000
Rabin . Efficient dispersal of information for security , load balancing , and fault tolerance
  • Journal of the ACM
  • 2001
Gnet whitepaper
  • Technical report, Purdue University,
  • 2001
Libfreenet, a case study in horrors incomprehensible to the mind of man, and other secure protocol design mistakes
  • Libfreenet, a case study in horrors incomprehensible to the mind of man, and other secure protocol design mistakes
  • 2002
...
...